MobileIron: Mobile-centric, Zero Trust Security€¦ · Assume bad actors are on your network....
Transcript of MobileIron: Mobile-centric, Zero Trust Security€¦ · Assume bad actors are on your network....
MobileIron:Mobile-centric, Zero Trust Security
David CritchleyRegional Director, UK & Ireland
MobileIron Confidential
Our MobileIron Team
• Martin Granger, Sector Lead (PS & Housing)
• Garry Cobb, Pre-Sales Manager
• Belinda Turnbull, Sales & Partner Development
MobileIron Confidential
DISCLAIMER
Statements in this presentation concerning future prospects, business outlook, and product availability and plans are forward looking statements that involve a number of uncertainties and risks. Factors that could cause actual events or results to differ materially include: sales productivity; possible disruptive effects of organizational changes; shifts in customer demand; perceptions of MobileIron and its prospects; technological changes; competitive factors; unanticipated delays in scheduled product availability dates; general business conditions; delays and inabilities in negotiating third partner partnerships, and other factors. The information on the roadmap is intended to outline our general product direction and it should not be relied upon in making purchasing decisions. The information on any roadmap shown is not a commitment, promise or legal obligation to deliver any material, code or functionality. The development, release and timing of any features or functionality described for our products remains at MobileIron’s sole discretion. Future product will be priced separately. This roadmap does not constitute an offer to sell any product or technology.
MobileIron Confidential
MOBILE IS AT THE CENTER OF OUR UNIVERSE
Smartphones over PCs
Website traffic from phones
Phone looks per day
Higher throughput from 5G vs 4G
Daily active users on Slack
The second most popular app category
MobileIron Confidential
of enterprises are using cloud
is the average number of cloud apps
an enterprise uses
MOBILE AND CLOUD ARE MAKING THE ENTERPRISE PERIMETER DISAPPEAR
MobileIron Confidential
MobileIron Confidential
THIS SHIFT REQUIRES A NEW SECURITY APPROACH
MobileIron Confidential
THE ZERO TRUST APPROACH
Never trust, always verify
Validate the device
Establish user context
Check app authorization
Verify networks
Detect and remediate threats
On-going compliance enforcement
Assume bad actors are on your network
MobileIron Confidential
MobileIron Confidential
WHO’S GOING TO FULLY SECURE AND UNLEASH THE POWER OF A
PERIMETER-LESS MOBILE ENTERPRISE?
Identity-centricapproach?
Gateway-centricapproach?
Device-centricapproach?
Limited visibility on device, app, and threats
Passwords are a security risk.
Limited visibility on device, app, and threats
25% enterprise traffic doesn’t go through the enterprise network
Comprehensive correlation between user, device, app, networks and
threats
Mobile is at the center of the enterprise
No. No. Yes.
MobileIron Confidential
MobileIron Confidential
Grant access
based on full context
(user, device, app, network, threat, time,
location and OS)
Provision any device for a user
with the appropriate apps, profiles and
policies
Protect data
at rest and in motion by containerizing and eliminating
threats on the device
Enforce
security policies (user, device, app,
network, threat, time, location and OS)
A ZERO TRUST MOBILE-CENTRIC APPROACH
MobileIron Confidential
HOW IDENTITY, GATEWAY AND EMMAPPROACHES STACK UP TODAY
MobileIronapproach:
Gatewayapproach:
Deviceapproach:
Identityapproach:
MobileIron Confidential
Ever-present Biometrics becomingyour identity
Amazing consumer experiences
MOBILE: MORE POWERFUL THAN YOU THINK
MobileIron Confidential
MAKE MOBILE YOUR ID IN THE ENTERPRISEUse the foundation of UEM to set up Zero Trust access from any device,
any OS, any location, to any service
MobileIron Confidential
Adding cloud services?
Enabling new types of devices and
users? Mam only,
task workers, Mac OS
Protect data on the device from
threats?
Want to enforce the broadest set of security policies?
A ZERO TRUST MOBILE-CENTRIC APPROACH WHERE ARE YOU ON YOUR JOURNEY TO ZERO TRUST?
MobileIron Confidential
MobileIron Confidential
HOW MOBILEIRON CAN HELP YOU
ON YOUR PATH TODAY
A ZERO TRUST MOBILE-CENTRIC ARCHITECTURE FOR THE HYBRID ENTERPRISE
Detection and Remediation
Cloud security
Intelligent gateway
Policy engine
On-device monitoring without requiring user action
SSO, MFA, Zero-password
Access control via per-app VPN to on-premises apps
Provision secure workspace, distribute apps and remote wipe
with one console
MobileIron Confidential
MobileIron Confidential
SECURE AND MANAGE ENDPOINTS FROM A SINGLE PLATFORM
Policy configuration and enforcement
Application management and distribution
Access control and multi-factor authentication
Threat detection and remediation
Drive business resiliency in the zero-trust world
Increase user adoption and compliance
Secure any device with any deployment for true
freedom of choice
Enhanced support Task Workers
Contractors - MAMBYOD
Data protection and Threat prevention
Analytic insight
Capabilities Benefits Use cases
MobileIron Confidential
MobileIron Confidential
ENABLE CLOUD SERVICES WITH SINGLE SIGN-ON
One-touch MFA
Password-less SSO
Adaptive policy engine
Protect data from unauthorized users,
devices, and apps using adaptive security policies
Provide a great user experience with
password-less sign-on
Secure enterprise cloud services such as
IT compliance for cloud with granular access
control policies
Capabilities Benefits Use cases
MobileIron Confidential
MobileIron Confidential
REAL-TIME, ON-DEVICE PROTECTION AGAINST KNOWN AND UNKNOWN THREATS
Capabilities Benefits Attack use cases
Easy to gain 100% user adoption with 1 app and automatic deployment
Insightful with immediate and ongoing visibility and risky app
analysis
On-device detection and remediation without Internet
connectivity
Phishing
Network
Apps
Profiles
Advanced compromise
Threat detection with machine learning algorithms
Detailed threat intelligence
Advanced app analytics
Local threat remediation and user notification on-device
Support for iOS and Android
MobileIron Confidential
MobileIron Confidential
Customers
A PROVEN MOBILE LEADER
Business critical endpoints
Security patents
Revenue renewal rate
Ecosystem partners
Gartner leaders quadrant
Recognition:
MobileIron Confidential
HOUSING CUSTOMERS
MobileIron Confidential
Housing: Mobile Working scenario
Existing issues How to overcome these issues
Roll out of 1,600 Apple mobile devices, including iPhones &
iPads
Roll-out of applications designed by association and a
third party
Moving applications to the cloud to allow employees
access anytime & anywhere
Costly, inefficient, paper-based systems
Tenants left waiting for repairs and home improvements
Disjointed internal communications
MobileIron Confidential
MobileIron Confidential
Housing: Mobile Working scenario
How does Mobileiron help? Business Benefits
Revolutionised internal communications
Increased employee productivity -both in the office and in the field
Enabled future considerations for the smart home
Access to corporate apps anywhere and any time
East deployment and management of devices
Peace of mind when deploying corporate applications
Security and visibility of any traffic up and down the network
Support for iOS and Android
MobileIron Confidential